Apache 2.2.13 with Overflow Protection

With Apache 2.2.13, developers have closed security holes in the popular webserver.

A security bulletin reports problems concerning the Apache Portable Runtime (APR) and the Apache Portable Utility (APU). Both libraries were vulnerable to remote sources using integer overflow to launch “denial of service” attacks that could cause the application to crash. The execution of malicious code using the same external method was also a possibility.

The new version not only fixes the bug but also improves compatibility with test version 1.0.0 of OpenSSL. The changelog has a list of all changes. The download webpage can be reached by following this link.